Houston, TX
MAY 21 - 22, 2018

Agenda Day 1

8:00 am - 8:45 am Registration and Coffee

8:45 am - 9:00 am Chairperson’s Welcoming Remarks

9:00 am - 9:45 am Cyberattacks & Emerging Threats: Ransomware, Other Threats from the Cutting Edge and Lessons Learned from Recent Breaches

  • Identifying the objectives needed to complete the cyber intrusion
  • Understanding the inherent advantages a defender has if the attack is properly identified
  • Identifying the end target of the intrusion in a timely manner
James Morrison, Cyber Task Force at Federal Bureau of Investigation

James Morrison

Cyber Task Force
Federal Bureau of Investigation

9:45 am - 10:30 am Cognitive SOC to Transform Security Measures

AI has become the buzzword of the century, but what do we mean when we say AI?  Does AI really have the ability to transform our operations into an automated, integrated and predictive function that addresses our resources restraints and builds intelligence into the infrastructure?
Carma Austin, Executive Security Advisor, Cognitive AI Program Lead at IBM

Carma Austin

Executive Security Advisor, Cognitive AI Program Lead
IBM

10:30 am - 11:15 am Morning Refreshment Break

11:15 am - 12:15 pm Identifying and Evaluating Privacy Risks and Making Smart Privacy Engineering Decisions

  • Understanding the distinctions and overlaps between privacy and security
  • Helping to understand the privacy risks and ramifications of new technology implementations
  • Designing information systems to protect privacy, now and in the future
Julie Snyder, Lead Security & Privacy Engineer at MITRE

Julie Snyder

Lead Security & Privacy Engineer
MITRE

11:15 am - 12:15 pm Developing and Implementing Effective User Awareness Training Programs

  • Adapting vulnerability assessment of current programs and their successes
  • Educating staff and employees on system updates to prepare for proper detection of system changes
  • Implementing company wide changes to uphold safety management among staff
Lorenzo Castro, CISSP, Senior Security Specialist  at Enterprise Products Partners, LP

Lorenzo Castro

CISSP, Senior Security Specialist
Enterprise Products Partners, LP

12:15 pm - 1:15 pm Networking Luncheon

All the morning hustle and bustle has probably made for a much- needed lunch break! Join us for a delicious lunch and make new friends at your table.

1:15 pm - 2:15 pm Facilitating IT Management Techniques for Uniform Incident Response

  • Implementing proper management techniques for IT Security
  • Reacting to threat detection and incident response
  • Investigating accurate channels for incident response measures
Levone Campbell, Cyber Security Lead/ Incident Coordinator at Aramco Services

Levone Campbell

Cyber Security Lead/ Incident Coordinator
Aramco Services

1:15 pm - 2:15 pm An Industrial Immune System: Using Machine Learning for Next Generation ICS Security

  • How new machine learning and mathematics are automating advanced threat detection
  • Why 100% network visibility allows you to preempt emerging situations, in real time, across both IT and OT environments
  • How smart prioritization and visualization of threats allows for better resource allocation and lower risk
  • Real-world examples of detected OT threats, from non-malicious insiders to sophisticated cyber-attackers
Jeff Cornelius PhD, EVP, Industrial Control and Critical Infrastructure Solutions at Darktrace

Jeff Cornelius PhD

EVP, Industrial Control and Critical Infrastructure Solutions
Darktrace

2:15 pm - 3:00 pm Budgetary and Infrastructure Changes to Revamp Security Efficiency: What is the Investment Needed?

·         Increasing budgets in basic needs- data rooms and tech equipment
·         Investing in the renewal of system facilities and removing vulnerable software
·         Updating training for new equipment and employee capabilities.

3:00 pm - 4:00 pm Panel: Industrial Control Systems (ICS) Security: Innovations and Bridging the Gap in IT-OT Convergence

·         Updating operational systems to meet current needs to limit hacking
·         Integrating IT components into the OT systems to limit risk of production failures
·         Treating the OT system hacks as a safety issue rather than security issue
Lauren Goodwin, Upstream | GPO & UEC | Digital Security and Risk Officer    at BP

Lauren Goodwin

Upstream | GPO & UEC | Digital Security and Risk Officer
BP

Levone Campbell, Cyber Security Lead/ Incident Coordinator at Aramco Services

Levone Campbell

Cyber Security Lead/ Incident Coordinator
Aramco Services

Jim Blaschke, Vice President, NA at CyberX

Jim Blaschke

Vice President, NA
CyberX

4:00 pm - 4:45 pm IT/OT Systems: Making Them Work Together

  • Financial confines of replacing antique systems in OT
  • Implementation of systems to bridge conversion between operations and information systems
  • Advancing training techniques for employees directly involved
Lauren Goodwin, Upstream | GPO & UEC | Digital Security and Risk Officer    at BP

Lauren Goodwin

Upstream | GPO & UEC | Digital Security and Risk Officer
BP

4:45 pm - 5:00 pm Chairperson Closing Remarks/ Break

5:00 pm - 6:00 pm End of Day 1- Cocktail Reception

OPERATION: HACKER ATTACK
Meet with hackers who will give you a real time showing of their hacking capabilities and what makes it so easy to enter systems.